










| TABLE 1 |
| EVENT DATA |
| Event data type | Description |
| Event Priority Description | Description of the event priority, such as |
| “CRITICAL EVENT”. | |
| Log Source Description | Description of the source of the event, such |
| as “FIREWALL”. | |
| Event Type Description | The type of event, such as a virus |
| contained in an attachment. | |
| Event Description | Description of the event, such as for a virus |
| event type the name of the virus identified. | |
| Event Date and Time | A time stamp related to the event, such as |
| when the message was received by the | |
| computing system. | |
| Source IP | The IP address that the event identifies as |
| its origination point. | |
| Event Protocol | Common network communications |
| protocol such as TCP, UDP, ICMP, etc | |
| Source Port | The IP port that a transmission originated |
| from, e.g.: HTTP data generally originates | |
| from port 80 | |
| Source URL | The uniform resource locator (URL) |
| address that the event identifies as its | |
| origination point. | |
| Source MAC | This is the Media Access Control address |
| for network devices (a.k.a. nodes). This is | |
| a standard unique “ID” for each physical | |
| port of network devices such as computer | |
| network interface cards, network switching | |
| equipment, etc. The Source MAC refers to | |
| the ID of the communication packet source | |
| device. | |
| Internal Source | Data indicating if the origination point of |
| the event is internal to the | |
| system | |
| 200. | |
| Blocked Source | Data indicating if the origination point of |
| the event is blocked by an existing IDS | |
| rule in the | |
| Blocked Destination | Data identifying a destination within the |
| protected network that is blocked by the | |
| administrator from receiving | |
| communications. | |
| Destination IP | The IP address that the event identifies as |
| its destination. | |
| Destination URL | The uniform resource locator (URL) |
| address that the event identifies as its | |
| destination | |
| Destination Port | The target IP port for a transmission, e.g.: |
| HTTP data is generally received by port | |
| 80. | |
| Destination MAC | This is the Media Access Control address |
| for network devices (a.k.a. nodes). This is | |
| a standard unique “ID” for each physical | |
| port of network devices such as computer | |
| network interface cards, network switching | |
| equipment, etc. The Destination MAC | |
| refers to the ID of the communication | |
| packet recipient device. | |
| Internal Destination | Data indicating if the destination point of |
| the event is internal to the | |
| system | |
| 200. | |
| Auto Bad Host | Data indicating the corresponding source |
| has been manually entered as a bad host, | |
| and should therefore be blocked without | |
| further analysis (the “Auto” refers to how | |
| the default value of this column is set when | |
| not specified). | |
| Auto Good Host | Data indicating the corresponding source |
| has been manually entered as a good host, | |
| and should therefore be allowed without | |
| further analysis (the “Auto” refers to how | |
| the default value of this column is set when | |
| not specified). | |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/592,580US8832833B2 (en) | 2004-01-23 | 2009-11-27 | Integrated data traffic monitoring system |
| US14/480,299US10326777B2 (en) | 2004-01-23 | 2014-09-08 | Integrated data traffic monitoring system |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US53896004P | 2004-01-23 | 2004-01-23 | |
| US76893104A | 2004-01-29 | 2004-01-29 | |
| US11/042,493US20050193429A1 (en) | 2004-01-23 | 2005-01-24 | Integrated data traffic monitoring system |
| US12/592,580US8832833B2 (en) | 2004-01-23 | 2009-11-27 | Integrated data traffic monitoring system |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/042,493ContinuationUS20050193429A1 (en) | 2004-01-23 | 2005-01-24 | Integrated data traffic monitoring system |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US14/480,299ContinuationUS10326777B2 (en) | 2004-01-23 | 2014-09-08 | Integrated data traffic monitoring system |
| Publication Number | Publication Date |
|---|---|
| US20100257598A1true US20100257598A1 (en) | 2010-10-07 |
| US8832833B2 US8832833B2 (en) | 2014-09-09 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/042,493AbandonedUS20050193429A1 (en) | 2004-01-23 | 2005-01-24 | Integrated data traffic monitoring system |
| US12/592,580Expired - LifetimeUS8832833B2 (en) | 2004-01-23 | 2009-11-27 | Integrated data traffic monitoring system |
| US14/480,299Active2026-08-08US10326777B2 (en) | 2004-01-23 | 2014-09-08 | Integrated data traffic monitoring system |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/042,493AbandonedUS20050193429A1 (en) | 2004-01-23 | 2005-01-24 | Integrated data traffic monitoring system |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US14/480,299Active2026-08-08US10326777B2 (en) | 2004-01-23 | 2014-09-08 | Integrated data traffic monitoring system |
| Country | Link |
|---|---|
| US (3) | US20050193429A1 (en) |
| WO (1) | WO2006080930A1 (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080115203A1 (en)* | 2006-11-14 | 2008-05-15 | Uri Elzur | Method and system for traffic engineering in secured networks |
| US20100256823A1 (en)* | 2009-04-04 | 2010-10-07 | Cisco Technology, Inc. | Mechanism for On-Demand Environmental Services Based on Network Activity |
| US20120192246A1 (en)* | 2010-11-24 | 2012-07-26 | Tufin Software Technologies Ltd. | Method and system for mapping between connectivity requests and a security rule set |
| US20120266230A1 (en)* | 2011-04-15 | 2012-10-18 | Lockheed Martin Corporation | Method and apparatus for cyber security |
| US20130094500A1 (en)* | 2011-10-13 | 2013-04-18 | Rosemount Inc. | Process installation network intrusion detection and prevention |
| WO2013062726A1 (en)* | 2011-10-24 | 2013-05-02 | Le Sant Aurelien | System and method for managing industrial processes |
| US20130333032A1 (en)* | 2012-06-12 | 2013-12-12 | Verizon Patent And Licensing Inc. | Network based device security and controls |
| US20130340022A1 (en)* | 2012-06-13 | 2013-12-19 | Hulu Llc | Architecture for Simulation of Network Conditions for Video Delivery |
| CN103916399A (en)* | 2014-04-15 | 2014-07-09 | 浪潮电子信息产业股份有限公司 | Computer information security defense system |
| US9240996B1 (en)* | 2013-03-28 | 2016-01-19 | Emc Corporation | Method and system for risk-adaptive access control of an application action |
| US20160315940A1 (en)* | 2013-07-02 | 2016-10-27 | Open Text S.A. | System and method for controlling access |
| US20170295076A1 (en)* | 2014-09-30 | 2017-10-12 | Orange | Method for accessing data related to at least one operation implented by a node device of a network |
| US10212023B2 (en)* | 2016-10-05 | 2019-02-19 | Vmware, Inc. | Methods and systems to identify and respond to low-priority event messages |
| US20190297056A1 (en)* | 2018-03-26 | 2019-09-26 | Kuo Chiang | Methods for preventing or detecting computer attacks in a cloud-based environment and apparatuses using the same |
| US20200153858A1 (en)* | 2016-10-25 | 2020-05-14 | Fortress Cyber Security, LLC | Security appliance |
| US10862864B2 (en) | 2018-04-04 | 2020-12-08 | Sophos Limited | Network device with transparent heartbeat processing |
| US10972431B2 (en) | 2018-04-04 | 2021-04-06 | Sophos Limited | Device management based on groups of network adapters |
| US20210126924A1 (en)* | 2009-11-30 | 2021-04-29 | Red Hat, Inc. | Monitoring cloud computing environments |
| EP3550795B1 (en) | 2014-04-16 | 2021-06-02 | Centripetal Networks Inc. | Methods and systems for protecting a secured network |
| US11075931B1 (en)* | 2018-12-31 | 2021-07-27 | Stealthbits Technologies Llc | Systems and methods for detecting malicious network activity |
| US20210258326A1 (en)* | 2020-02-17 | 2021-08-19 | Avanan Inc. | Responsive actions to suspicious e-mail, as inferred from negative user assessment, by third party security systems without modification of existing e-mail clients |
| US11140195B2 (en)* | 2018-04-04 | 2021-10-05 | Sophos Limited | Secure endpoint in a heterogenous enterprise network |
| US11184391B2 (en) | 2016-06-30 | 2021-11-23 | Sophos Limited | Server-client authentication with integrated status update |
| US11271950B2 (en) | 2018-04-04 | 2022-03-08 | Sophos Limited | Securing endpoints in a heterogenous enterprise network |
| US20230013924A1 (en)* | 2019-12-17 | 2023-01-19 | Signify Holding B.V. | Route discovery in networks with combo nodes |
| US11616758B2 (en) | 2018-04-04 | 2023-03-28 | Sophos Limited | Network device for securing endpoints in a heterogeneous enterprise network |
| EP4318410A3 (en)* | 2018-10-09 | 2024-04-17 | eBay Inc. | Distributed application architectures using blockchain and distributed file systems |
| US12164661B1 (en)* | 2024-01-30 | 2024-12-10 | Grip Security Ltd | Security interface for controlling access to email-data |
| US12219360B1 (en) | 2024-07-24 | 2025-02-04 | Netskope, Inc. | Cellular IoT security using dynamic policy-driven mechanisms for threat mitigation |
| US12255898B1 (en)* | 2024-09-05 | 2025-03-18 | Grip Security Ltd | Management of access to external authorized services |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8079086B1 (en) | 1997-11-06 | 2011-12-13 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
| US7058822B2 (en) | 2000-03-30 | 2006-06-06 | Finjan Software, Ltd. | Malicious mobile code runtime monitoring system and methods |
| US9219755B2 (en) | 1996-11-08 | 2015-12-22 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
| US20040052664A1 (en)* | 2001-01-05 | 2004-03-18 | Atsuji Saito | High-pressure fuel feed pump |
| MY141160A (en)* | 2003-01-13 | 2010-03-31 | Multimedia Glory Sdn Bhd | System and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network |
| US7219131B2 (en)* | 2003-01-16 | 2007-05-15 | Ironport Systems, Inc. | Electronic message delivery using an alternate source approach |
| CA2554915C (en)* | 2004-02-17 | 2013-05-28 | Ironport Systems, Inc. | Collecting, aggregating, and managing information relating to electronic messages |
| US7756930B2 (en) | 2004-05-28 | 2010-07-13 | Ironport Systems, Inc. | Techniques for determining the reputation of a message sender |
| US7870200B2 (en) | 2004-05-29 | 2011-01-11 | Ironport Systems, Inc. | Monitoring the flow of messages received at a server |
| US7873695B2 (en) | 2004-05-29 | 2011-01-18 | Ironport Systems, Inc. | Managing connections and messages at a server by associating different actions for both different senders and different recipients |
| US7849142B2 (en) | 2004-05-29 | 2010-12-07 | Ironport Systems, Inc. | Managing connections, messages, and directory harvest attacks at a server |
| US7748038B2 (en)* | 2004-06-16 | 2010-06-29 | Ironport Systems, Inc. | Method and apparatus for managing computer virus outbreaks |
| US7562389B1 (en)* | 2004-07-30 | 2009-07-14 | Cisco Technology, Inc. | Method and system for network security |
| US7555774B2 (en)* | 2004-08-02 | 2009-06-30 | Cisco Technology, Inc. | Inline intrusion detection using a single physical port |
| GB0420810D0 (en)* | 2004-09-18 | 2004-10-20 | Ibm | Data processing system and method |
| US7577737B2 (en)* | 2004-09-23 | 2009-08-18 | Cisco Technology, Inc. | Method and apparatus for controlling data to be routed in a data communications network |
| US7937761B1 (en)* | 2004-12-17 | 2011-05-03 | Symantec Corporation | Differential threat detection processing |
| US7725938B2 (en) | 2005-01-20 | 2010-05-25 | Cisco Technology, Inc. | Inline intrusion detection |
| EP1851651A2 (en)* | 2005-02-11 | 2007-11-07 | Critical Path Inc. | Methods and systems for communicating digital content |
| JP4557815B2 (en)* | 2005-06-13 | 2010-10-06 | 富士通株式会社 | Relay device and relay system |
| US20060288418A1 (en)* | 2005-06-15 | 2006-12-21 | Tzu-Jian Yang | Computer-implemented method with real-time response mechanism for detecting viruses in data transfer on a stream basis |
| DE102005046935B4 (en)* | 2005-09-30 | 2009-07-23 | Nokia Siemens Networks Gmbh & Co.Kg | Network access node computer to a communication network, communication system and method for assigning a protection device |
| US7647623B2 (en)* | 2005-10-17 | 2010-01-12 | Alcatel Lucent | Application layer ingress filtering |
| US8468589B2 (en) | 2006-01-13 | 2013-06-18 | Fortinet, Inc. | Computerized system and method for advanced network content processing |
| US7966654B2 (en) | 2005-11-22 | 2011-06-21 | Fortinet, Inc. | Computerized system and method for policy-based content filtering |
| US8266697B2 (en)* | 2006-03-04 | 2012-09-11 | 21St Century Technologies, Inc. | Enabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data |
| GB2432934B (en)* | 2006-03-14 | 2007-12-19 | Streamshield Networks Ltd | A method and apparatus for providing network security |
| JP2007251866A (en)* | 2006-03-20 | 2007-09-27 | Kyocera Mita Corp | Electronic equipment device |
| US20070237129A1 (en)* | 2006-04-06 | 2007-10-11 | Dennis Sych | Method and system for automatic intruder blocking on an Internet Protocol based network |
| US7606214B1 (en)* | 2006-09-14 | 2009-10-20 | Trend Micro Incorporated | Anti-spam implementations in a router at the network layer |
| US7849186B2 (en)* | 2006-09-21 | 2010-12-07 | Commtouch Software Ltd. | Device, method and system for detecting unwanted conversational media session |
| US8484733B2 (en)* | 2006-11-28 | 2013-07-09 | Cisco Technology, Inc. | Messaging security device |
| US20080209558A1 (en)* | 2007-02-22 | 2008-08-28 | Aladdin Knowledge Systems | Self-defensive protected software with suspended latent license enforcement |
| US7870610B1 (en)* | 2007-03-16 | 2011-01-11 | The Board Of Directors Of The Leland Stanford Junior University | Detection of malicious programs |
| US20080295153A1 (en)* | 2007-05-24 | 2008-11-27 | Zhidan Cheng | System and method for detection and communication of computer infection status in a networked environment |
| US20080320596A1 (en)* | 2007-06-22 | 2008-12-25 | Feng Chi Wang | Distributed digital rights management system and methods for use therewith |
| US20090019121A1 (en)* | 2007-07-10 | 2009-01-15 | Messagelabs Limited | Message processing |
| US8087061B2 (en)* | 2007-08-07 | 2011-12-27 | Microsoft Corporation | Resource-reordered remediation of malware threats |
| US20090064334A1 (en)* | 2007-08-30 | 2009-03-05 | International Business Machines Corporation | Adaptive Autonomic Threat Detection and Quarantine |
| KR100916324B1 (en)* | 2007-11-08 | 2009-09-11 | 한국전자통신연구원 | Method, device and system for managing malicious code distribution site using firewall |
| US8561129B2 (en)* | 2008-02-28 | 2013-10-15 | Mcafee, Inc | Unified network threat management with rule classification |
| US20090265777A1 (en)* | 2008-04-21 | 2009-10-22 | Zytron Corp. | Collaborative and proactive defense of networks and information systems |
| US8627060B2 (en)* | 2008-04-30 | 2014-01-07 | Viasat, Inc. | Trusted network interface |
| US8279768B2 (en)* | 2008-05-05 | 2012-10-02 | Eaton Corporation | Methods, devices and computer program products for capturing events associated network anomalies |
| DE602008004491D1 (en) | 2008-07-04 | 2011-02-24 | Alcatel Lucent | Method and system for a communication network against intruders |
| US8490171B2 (en)* | 2008-07-14 | 2013-07-16 | Tufin Software Technologies Ltd. | Method of configuring a security gateway and system thereof |
| US8122129B2 (en)* | 2008-09-09 | 2012-02-21 | Actiance, Inc. | Hash-based resource matching |
| US20100064353A1 (en)* | 2008-09-09 | 2010-03-11 | Facetime Communications, Inc. | User Mapping Mechanisms |
| US20110238587A1 (en)* | 2008-09-23 | 2011-09-29 | Savvis, Inc. | Policy management system and method |
| US8220056B2 (en)* | 2008-09-23 | 2012-07-10 | Savvis, Inc. | Threat management system and method |
| US8484338B2 (en)* | 2008-10-02 | 2013-07-09 | Actiance, Inc. | Application detection architecture and techniques |
| US8621065B1 (en)* | 2008-10-23 | 2013-12-31 | Amazon Technologies, Inc. | Dynamic blocking of suspicious electronic submissions |
| US8463730B1 (en) | 2008-10-24 | 2013-06-11 | Vmware, Inc. | Rapid evaluation of numerically large complex rules governing network and application transactions |
| US9559800B1 (en) | 2008-10-24 | 2017-01-31 | Vmware, Inc. | Dynamic packet filtering |
| US8806632B2 (en)* | 2008-11-17 | 2014-08-12 | Solarwinds Worldwide, Llc | Systems, methods, and devices for detecting security vulnerabilities in IP networks |
| US20100125663A1 (en)* | 2008-11-17 | 2010-05-20 | Donovan John J | Systems, methods, and devices for detecting security vulnerabilities in ip networks |
| US9413598B2 (en)* | 2009-09-02 | 2016-08-09 | International Business Machines Corporation | Graph structures for event matching |
| US8413241B2 (en)* | 2009-09-17 | 2013-04-02 | Oracle America, Inc. | Integrated intrusion deflection, detection and introspection |
| US8953631B2 (en)* | 2010-06-30 | 2015-02-10 | Intel Corporation | Interruption, at least in part, of frame transmission |
| US9384112B2 (en)* | 2010-07-01 | 2016-07-05 | Logrhythm, Inc. | Log collection, structuring and processing |
| KR101377462B1 (en)* | 2010-08-24 | 2014-03-25 | 한국전자통신연구원 | Automated Control Method And Apparatus of DDos Attack Prevention Policy Using the status of CPU and Memory |
| JP5703111B2 (en)* | 2011-04-25 | 2015-04-15 | 株式会社日立製作所 | Communication system and apparatus |
| US8726385B2 (en)* | 2011-10-05 | 2014-05-13 | Mcafee, Inc. | Distributed system and method for tracking and blocking malicious internet hosts |
| US9843488B2 (en) | 2011-11-07 | 2017-12-12 | Netflow Logic Corporation | Method and system for confident anomaly detection in computer network traffic |
| US10171352B2 (en)* | 2011-12-21 | 2019-01-01 | Nec Corporation | Communication system, node, control device, communication method, and program |
| US8953471B2 (en)* | 2012-01-05 | 2015-02-10 | International Business Machines Corporation | Counteracting spam in voice over internet protocol telephony systems |
| US8914406B1 (en)* | 2012-02-01 | 2014-12-16 | Vorstack, Inc. | Scalable network security with fast response protocol |
| US9137258B2 (en)* | 2012-02-01 | 2015-09-15 | Brightpoint Security, Inc. | Techniques for sharing network security event information |
| US9710644B2 (en) | 2012-02-01 | 2017-07-18 | Servicenow, Inc. | Techniques for sharing network security event information |
| US9245439B2 (en)* | 2012-03-28 | 2016-01-26 | Ecolink Intelligent Technology, Inc. | Temporary security bypass method and apparatus |
| FR2995427B1 (en)* | 2012-09-12 | 2015-07-17 | Tibsys | DEVICE FOR MONITORING FRAMES TO THE INTERCONNECTION OF A DOMESTIC HOME NETWORK AND THE INTERNET |
| US9930011B1 (en) | 2012-11-30 | 2018-03-27 | United Services Automobile Association (Usaa) | Private network request forwarding |
| US10666620B1 (en) | 2012-11-30 | 2020-05-26 | United Services Automobile Association (Usaa) | Private network request forwarding |
| US9467326B2 (en)* | 2012-12-03 | 2016-10-11 | Hewlett-Packard Development Company, L.P. | Rate limiting mechanism based on device load/capacity or traffic content |
| JP6001781B2 (en)* | 2013-07-05 | 2016-10-05 | 日本電信電話株式会社 | Unauthorized access detection system and unauthorized access detection method |
| CN105981079A (en) | 2013-07-15 | 2016-09-28 | 赛博赛尔有限公司 | Network protection |
| US9548993B2 (en)* | 2013-08-28 | 2017-01-17 | Verizon Patent And Licensing Inc. | Automated security gateway |
| GB2517740B (en)* | 2013-08-30 | 2016-03-30 | Eco Hive Ltd | A Monitoring Arrangement |
| US9332903B2 (en) | 2013-09-19 | 2016-05-10 | Gn Otometrics A/S | Headgear for observation of eye movements |
| KR101502490B1 (en)* | 2013-10-18 | 2015-03-13 | 주식회사 케이티 | Subscibe terminal and security farm node for monitoring network traffic |
| US20150128267A1 (en)* | 2013-11-06 | 2015-05-07 | Mcafee, Inc. | Context-aware network forensics |
| US10334085B2 (en)* | 2015-01-29 | 2019-06-25 | Splunk Inc. | Facilitating custom content extraction from network packets |
| US10230742B2 (en)* | 2015-01-30 | 2019-03-12 | Anomali Incorporated | Space and time efficient threat detection |
| CN105765942A (en)* | 2015-03-18 | 2016-07-13 | 策安保安有限公司 | Systems and methods for information security threat disruption via a border gateway |
| CA2994257C (en) | 2015-07-02 | 2022-03-15 | Reliaquest Holdings, Llc | Threat intelligence system and method |
| US10193919B2 (en) | 2015-08-24 | 2019-01-29 | Empow Cyber Security, Ltd | Risk-chain generation of cyber-threats |
| AU2016367922B2 (en) | 2015-12-11 | 2019-08-08 | Servicenow, Inc. | Computer network threat assessment |
| US10348687B2 (en)* | 2015-12-18 | 2019-07-09 | Worcester Polytechnic Institute | Method and apparatus for using software defined networking and network function virtualization to secure residential networks |
| JP2017147575A (en)* | 2016-02-16 | 2017-08-24 | 富士通株式会社 | Control program, control device, and control method |
| DE102016107647B4 (en) | 2016-03-08 | 2018-08-30 | Viktor Mraz | Method and storage medium for securing / monitoring a network |
| CA2968710A1 (en)* | 2016-05-31 | 2017-11-30 | Valarie Ann Findlay | Security threat information gathering and incident reporting systems and methods |
| US10419494B2 (en) | 2016-09-26 | 2019-09-17 | Splunk Inc. | Managing the collection of forensic data from endpoint devices |
| US10425442B2 (en)* | 2016-09-26 | 2019-09-24 | Splunk Inc. | Correlating forensic data collected from endpoint devices with other non-forensic data |
| CN106506556B (en)* | 2016-12-29 | 2019-11-19 | 北京神州绿盟信息安全科技股份有限公司 | A kind of network flow abnormal detecting method and device |
| US10333960B2 (en) | 2017-05-03 | 2019-06-25 | Servicenow, Inc. | Aggregating network security data for export |
| US20180324207A1 (en) | 2017-05-05 | 2018-11-08 | Servicenow, Inc. | Network security threat intelligence sharing |
| CN107181769A (en)* | 2017-07-28 | 2017-09-19 | 山东超越数控电子有限公司 | A kind of network intrusion prevention system and method |
| US11494395B2 (en) | 2017-07-31 | 2022-11-08 | Splunk Inc. | Creating dashboards for viewing data in a data storage system based on natural language requests |
| US11240207B2 (en) | 2017-08-11 | 2022-02-01 | L3 Technologies, Inc. | Network isolation |
| US11601467B2 (en) | 2017-08-24 | 2023-03-07 | L3 Technologies, Inc. | Service provider advanced threat protection |
| US11223601B2 (en) | 2017-09-28 | 2022-01-11 | L3 Technologies, Inc. | Network isolation for collaboration software |
| US11374906B2 (en) | 2017-09-28 | 2022-06-28 | L3 Technologies, Inc. | Data exfiltration system and methods |
| US11552987B2 (en)* | 2017-09-28 | 2023-01-10 | L3 Technologies, Inc. | Systems and methods for command and control protection |
| US11336619B2 (en) | 2017-09-28 | 2022-05-17 | L3 Technologies, Inc. | Host process and memory separation |
| US11550898B2 (en) | 2017-10-23 | 2023-01-10 | L3 Technologies, Inc. | Browser application implementing sandbox based internet isolation |
| US11368474B2 (en)* | 2018-01-23 | 2022-06-21 | Rapid7, Inc. | Detecting anomalous internet behavior |
| CN108762905B (en)* | 2018-05-24 | 2020-12-11 | 苏州乐麟无线信息科技有限公司 | Method and device for processing multitask events |
| US10762192B2 (en)* | 2018-08-22 | 2020-09-01 | Paypal, Inc. | Cleartext password detection using machine learning |
| US11233816B2 (en)* | 2019-02-15 | 2022-01-25 | Verizon Patent And Licensing Inc. | User-determined network traffic filtering |
| US11057428B1 (en)* | 2019-03-28 | 2021-07-06 | Rapid7, Inc. | Honeytoken tracker |
| US10893060B2 (en)* | 2019-04-05 | 2021-01-12 | Material Security Inc. | Defanging malicious electronic files based on trusted user reporting |
| US11444919B2 (en) | 2019-05-20 | 2022-09-13 | Woodward, Inc. | Mission critical security zone |
| WO2021010223A1 (en)* | 2019-07-12 | 2021-01-21 | 日立オートモティブシステムズ株式会社 | Gateway device |
| FR3104761A1 (en)* | 2019-12-12 | 2021-06-18 | Orange | Method for monitoring data passing through user equipment |
| RU2743974C1 (en) | 2019-12-19 | 2021-03-01 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | System and method for scanning security of elements of network architecture |
| RU2722693C1 (en) | 2020-01-27 | 2020-06-03 | Общество с ограниченной ответственностью «Группа АйБи ТДС» | Method and system for detecting the infrastructure of a malicious software or a cybercriminal |
| US11677758B2 (en)* | 2020-03-04 | 2023-06-13 | Cisco Technology, Inc. | Minimizing data flow between computing infrastructures for email security |
| US11651067B2 (en)* | 2020-06-23 | 2023-05-16 | Acronis International Gmbh | Systems and methods for detecting stored passwords vulnerable to compromise |
| US11836032B2 (en)* | 2020-10-15 | 2023-12-05 | State Farm Mutual Automobile Insurance Company | Error monitoring and prevention in computing systems based on determined trends and routing a data stream over a second network having less latency |
| US11362996B2 (en)* | 2020-10-27 | 2022-06-14 | Centripetal Networks, Inc. | Methods and systems for efficient adaptive logging of cyber threat incidents |
| US11363062B1 (en) | 2021-03-31 | 2022-06-14 | Peakstar Technologies Inc. | System and method for decentralized internet traffic filtering policy reporting |
| US20220353279A1 (en)* | 2021-04-29 | 2022-11-03 | KnowBe4, Inc. | Systems and methods for determination of indicators of malicious elements within messages |
| NL2030861B1 (en) | 2021-06-01 | 2023-03-14 | Trust Ltd | System and method for external monitoring a cyberattack surface |
| RU2769075C1 (en)* | 2021-06-10 | 2022-03-28 | Общество с ограниченной ответственностью "Группа АйБи ТДС" | System and method for active detection of malicious network resources |
| CN114124450A (en)* | 2021-10-15 | 2022-03-01 | 广东电网有限责任公司广州供电局 | Network security system and method for remote storage battery capacity checking |
| US20230140706A1 (en)* | 2021-11-01 | 2023-05-04 | Recorded Future, Inc. | Pipelined Malware Infrastructure Identification |
| CN114510402A (en)* | 2022-04-19 | 2022-05-17 | 深圳市信润富联数字科技有限公司 | System application level performance monitoring system and method |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6192518B1 (en)* | 1998-01-22 | 2001-02-20 | Mis Only, Inc. | Method for distributing software over network links via electronic mail |
| US6256775B1 (en)* | 1997-12-11 | 2001-07-03 | International Business Machines Corporation | Facilities for detailed software performance analysis in a multithreaded processor |
| US6363489B1 (en)* | 1999-11-29 | 2002-03-26 | Forescout Technologies Inc. | Method for automatic intrusion detection and deflection in a network |
| US6405250B1 (en)* | 1999-01-25 | 2002-06-11 | Lucent Technologies Inc. | Network management system based on passive monitoring and proactive management for formulation behavior state transition models |
| US20020078202A1 (en)* | 2000-12-15 | 2002-06-20 | Tadanao Ando | IP network system having unauthorized intrusion safeguard function |
| US20020087882A1 (en)* | 2000-03-16 | 2002-07-04 | Bruce Schneier | Mehtod and system for dynamic network intrusion monitoring detection and response |
| US20020107953A1 (en)* | 2001-01-16 | 2002-08-08 | Mark Ontiveros | Method and device for monitoring data traffic and preventing unauthorized access to a network |
| US20020133586A1 (en)* | 2001-01-16 | 2002-09-19 | Carter Shanklin | Method and device for monitoring data traffic and preventing unauthorized access to a network |
| US20020165954A1 (en)* | 2001-05-04 | 2002-11-07 | Kave Eshghi | System and method for monitoring browser event activities |
| US20020188864A1 (en)* | 2001-06-06 | 2002-12-12 | Jackson Gary Manuel | Intrusion prevention system |
| US6526413B2 (en)* | 1999-09-28 | 2003-02-25 | Microsoft Corporation | Architecture for a hierarchical folder structure in hand-held computers |
| US20030061256A1 (en)* | 2001-04-19 | 2003-03-27 | Infomove, Inc. | Method and system for generalized and adaptive transaction processing between uniform information services and applications |
| US20030172064A1 (en)* | 2002-03-08 | 2003-09-11 | Snapp Robert F. | Method for preventing improper correction of a database during an updating process |
| US6701440B1 (en)* | 2000-01-06 | 2004-03-02 | Networks Associates Technology, Inc. | Method and system for protecting a computer using a remote e-mail scanning device |
| US20040133672A1 (en)* | 2003-01-08 | 2004-07-08 | Partha Bhattacharya | Network security monitoring system |
| US6816890B2 (en)* | 2001-05-28 | 2004-11-09 | Hitachi, Ltd. | Gateway apparatus with LAC function |
| US20040250124A1 (en)* | 2003-05-19 | 2004-12-09 | Vsecure Technologies (Us) Inc. | Dynamic network protection |
| US20040255167A1 (en)* | 2003-04-28 | 2004-12-16 | Knight James Michael | Method and system for remote network security management |
| US20050005017A1 (en)* | 2003-07-03 | 2005-01-06 | Arbor Networks, Inc. | Method and system for reducing scope of self-propagating attack code in network |
| US20050177868A1 (en)* | 2003-07-11 | 2005-08-11 | Computer Associates Think, Inc. | Method and system for protecting against computer viruses |
| US20050193430A1 (en)* | 2002-10-01 | 2005-09-01 | Gideon Cohen | System and method for risk detection and analysis in a computer network |
| US20050251570A1 (en)* | 2002-04-18 | 2005-11-10 | John Heasman | Intrusion detection system |
| US6993022B1 (en)* | 2000-07-06 | 2006-01-31 | Sony Corporation | Method of and apparatus for directly mapping communications through a router between nodes on different buses within a network of buses |
| US20060031938A1 (en)* | 2002-10-22 | 2006-02-09 | Unho Choi | Integrated emergency response system in information infrastructure and operating method therefor |
| US7213265B2 (en)* | 2000-11-15 | 2007-05-01 | Lockheed Martin Corporation | Real time active network compartmentalization |
| US7263561B1 (en)* | 2001-08-24 | 2007-08-28 | Mcafee, Inc. | Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6678827B1 (en)* | 1999-05-06 | 2004-01-13 | Watchguard Technologies, Inc. | Managing multiple network security devices from a manager device |
| TW453072B (en)* | 1999-08-18 | 2001-09-01 | Alma Baba Technical Res Lab Co | System for montoring network for cracker attacic |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6256775B1 (en)* | 1997-12-11 | 2001-07-03 | International Business Machines Corporation | Facilities for detailed software performance analysis in a multithreaded processor |
| US6192518B1 (en)* | 1998-01-22 | 2001-02-20 | Mis Only, Inc. | Method for distributing software over network links via electronic mail |
| US6405250B1 (en)* | 1999-01-25 | 2002-06-11 | Lucent Technologies Inc. | Network management system based on passive monitoring and proactive management for formulation behavior state transition models |
| US6526413B2 (en)* | 1999-09-28 | 2003-02-25 | Microsoft Corporation | Architecture for a hierarchical folder structure in hand-held computers |
| US6363489B1 (en)* | 1999-11-29 | 2002-03-26 | Forescout Technologies Inc. | Method for automatic intrusion detection and deflection in a network |
| US6701440B1 (en)* | 2000-01-06 | 2004-03-02 | Networks Associates Technology, Inc. | Method and system for protecting a computer using a remote e-mail scanning device |
| US20020087882A1 (en)* | 2000-03-16 | 2002-07-04 | Bruce Schneier | Mehtod and system for dynamic network intrusion monitoring detection and response |
| US6993022B1 (en)* | 2000-07-06 | 2006-01-31 | Sony Corporation | Method of and apparatus for directly mapping communications through a router between nodes on different buses within a network of buses |
| US7213265B2 (en)* | 2000-11-15 | 2007-05-01 | Lockheed Martin Corporation | Real time active network compartmentalization |
| US20020078202A1 (en)* | 2000-12-15 | 2002-06-20 | Tadanao Ando | IP network system having unauthorized intrusion safeguard function |
| US20020133586A1 (en)* | 2001-01-16 | 2002-09-19 | Carter Shanklin | Method and device for monitoring data traffic and preventing unauthorized access to a network |
| US20020107953A1 (en)* | 2001-01-16 | 2002-08-08 | Mark Ontiveros | Method and device for monitoring data traffic and preventing unauthorized access to a network |
| US20030061256A1 (en)* | 2001-04-19 | 2003-03-27 | Infomove, Inc. | Method and system for generalized and adaptive transaction processing between uniform information services and applications |
| US20020165954A1 (en)* | 2001-05-04 | 2002-11-07 | Kave Eshghi | System and method for monitoring browser event activities |
| US6816890B2 (en)* | 2001-05-28 | 2004-11-09 | Hitachi, Ltd. | Gateway apparatus with LAC function |
| US20020188864A1 (en)* | 2001-06-06 | 2002-12-12 | Jackson Gary Manuel | Intrusion prevention system |
| US7263561B1 (en)* | 2001-08-24 | 2007-08-28 | Mcafee, Inc. | Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient |
| US20030172064A1 (en)* | 2002-03-08 | 2003-09-11 | Snapp Robert F. | Method for preventing improper correction of a database during an updating process |
| US20050251570A1 (en)* | 2002-04-18 | 2005-11-10 | John Heasman | Intrusion detection system |
| US20050193430A1 (en)* | 2002-10-01 | 2005-09-01 | Gideon Cohen | System and method for risk detection and analysis in a computer network |
| US6952779B1 (en)* | 2002-10-01 | 2005-10-04 | Gideon Cohen | System and method for risk detection and analysis in a computer network |
| US20060031938A1 (en)* | 2002-10-22 | 2006-02-09 | Unho Choi | Integrated emergency response system in information infrastructure and operating method therefor |
| US20040133672A1 (en)* | 2003-01-08 | 2004-07-08 | Partha Bhattacharya | Network security monitoring system |
| US20040255167A1 (en)* | 2003-04-28 | 2004-12-16 | Knight James Michael | Method and system for remote network security management |
| US20040250124A1 (en)* | 2003-05-19 | 2004-12-09 | Vsecure Technologies (Us) Inc. | Dynamic network protection |
| US20050005017A1 (en)* | 2003-07-03 | 2005-01-06 | Arbor Networks, Inc. | Method and system for reducing scope of self-propagating attack code in network |
| US20050177868A1 (en)* | 2003-07-11 | 2005-08-11 | Computer Associates Think, Inc. | Method and system for protecting against computer viruses |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080115203A1 (en)* | 2006-11-14 | 2008-05-15 | Uri Elzur | Method and system for traffic engineering in secured networks |
| US9461975B2 (en) | 2006-11-14 | 2016-10-04 | Broadcom Corporation | Method and system for traffic engineering in secured networks |
| US9185097B2 (en) | 2006-11-14 | 2015-11-10 | Broadcom Corporation | Method and system for traffic engineering in secured networks |
| US8418241B2 (en)* | 2006-11-14 | 2013-04-09 | Broadcom Corporation | Method and system for traffic engineering in secured networks |
| US20100256823A1 (en)* | 2009-04-04 | 2010-10-07 | Cisco Technology, Inc. | Mechanism for On-Demand Environmental Services Based on Network Activity |
| US20210126924A1 (en)* | 2009-11-30 | 2021-04-29 | Red Hat, Inc. | Monitoring cloud computing environments |
| US11949709B2 (en)* | 2009-11-30 | 2024-04-02 | Red Hat, Inc. | Monitoring cloud computing environments |
| US9313175B2 (en)* | 2010-11-24 | 2016-04-12 | Tufin Software Technologes Ltd. | Method and system for mapping between connectivity requests and a security rule set |
| US8914841B2 (en)* | 2010-11-24 | 2014-12-16 | Tufin Software Technologies Ltd. | Method and system for mapping between connectivity requests and a security rule set |
| US20150074755A1 (en)* | 2010-11-24 | 2015-03-12 | Tufin Software Technologies Ltd. | Method and system for mapping between connectivity requests and a security rule set |
| US20120192246A1 (en)* | 2010-11-24 | 2012-07-26 | Tufin Software Technologies Ltd. | Method and system for mapping between connectivity requests and a security rule set |
| US9065799B2 (en)* | 2011-04-15 | 2015-06-23 | Lockheed Martin Corporation | Method and apparatus for cyber security |
| US20120266230A1 (en)* | 2011-04-15 | 2012-10-18 | Lockheed Martin Corporation | Method and apparatus for cyber security |
| US20130094500A1 (en)* | 2011-10-13 | 2013-04-18 | Rosemount Inc. | Process installation network intrusion detection and prevention |
| US9270642B2 (en)* | 2011-10-13 | 2016-02-23 | Rosemount Inc. | Process installation network intrusion detection and prevention |
| WO2013062726A1 (en)* | 2011-10-24 | 2013-05-02 | Le Sant Aurelien | System and method for managing industrial processes |
| US20130333032A1 (en)* | 2012-06-12 | 2013-12-12 | Verizon Patent And Licensing Inc. | Network based device security and controls |
| US9055090B2 (en)* | 2012-06-12 | 2015-06-09 | Verizon Patent And Licensing Inc. | Network based device security and controls |
| US8775672B2 (en)* | 2012-06-13 | 2014-07-08 | Hulu, LLC | Architecture for simulation of network conditions for video delivery |
| US20130340022A1 (en)* | 2012-06-13 | 2013-12-19 | Hulu Llc | Architecture for Simulation of Network Conditions for Video Delivery |
| US12107893B2 (en) | 2012-10-22 | 2024-10-01 | Centripetal Networks, Llc | Methods and systems for protecting a secured network |
| US20160088005A1 (en)* | 2013-03-28 | 2016-03-24 | Emc Corporation | Method and system for risk-adaptive access control of an application action |
| US9240996B1 (en)* | 2013-03-28 | 2016-01-19 | Emc Corporation | Method and system for risk-adaptive access control of an application action |
| US9992213B2 (en)* | 2013-03-28 | 2018-06-05 | Emc Corporation | Risk-adaptive access control of an application action based on threat detection data |
| US20160315940A1 (en)* | 2013-07-02 | 2016-10-27 | Open Text S.A. | System and method for controlling access |
| US10154035B2 (en)* | 2013-07-02 | 2018-12-11 | Open Text Sa Ulc | System and method for controlling access |
| CN103916399A (en)* | 2014-04-15 | 2014-07-09 | 浪潮电子信息产业股份有限公司 | Computer information security defense system |
| EP3550795B1 (en) | 2014-04-16 | 2021-06-02 | Centripetal Networks Inc. | Methods and systems for protecting a secured network |
| US11477237B2 (en) | 2014-04-16 | 2022-10-18 | Centripetal Networks, Inc. | Methods and systems for protecting a secured network |
| EP3869767B1 (en) | 2014-04-16 | 2022-01-05 | Centripetal Networks Inc. | Methods and systems for protecting a secured network |
| US10841186B2 (en)* | 2014-09-30 | 2020-11-17 | Orange | Method for accessing data related to at least one operation implented by a node device of a network |
| US20170295076A1 (en)* | 2014-09-30 | 2017-10-12 | Orange | Method for accessing data related to at least one operation implented by a node device of a network |
| US12244641B2 (en) | 2016-06-30 | 2025-03-04 | Sophos Limited | Application firewall |
| US11184392B2 (en) | 2016-06-30 | 2021-11-23 | Sophos Limited | Detecting lateral movement by malicious applications |
| US11736522B2 (en) | 2016-06-30 | 2023-08-22 | Sophos Limited | Server-client authentication with integrated status update |
| US11722521B2 (en) | 2016-06-30 | 2023-08-08 | Sophos Limited | Application firewall |
| US11184391B2 (en) | 2016-06-30 | 2021-11-23 | Sophos Limited | Server-client authentication with integrated status update |
| US10212023B2 (en)* | 2016-10-05 | 2019-02-19 | Vmware, Inc. | Methods and systems to identify and respond to low-priority event messages |
| US20200153858A1 (en)* | 2016-10-25 | 2020-05-14 | Fortress Cyber Security, LLC | Security appliance |
| US11575705B2 (en)* | 2016-10-25 | 2023-02-07 | Fortress Cyber Security, LLC | Security appliance |
| US11985163B2 (en)* | 2016-10-25 | 2024-05-14 | Fortress Cyber Security, LLC | Security appliance |
| US10841281B2 (en)* | 2018-03-26 | 2020-11-17 | Kuo Chiang | Methods for preventing or detecting computer attacks in a cloud-based environment and apparatuses using the same |
| US20190297056A1 (en)* | 2018-03-26 | 2019-09-26 | Kuo Chiang | Methods for preventing or detecting computer attacks in a cloud-based environment and apparatuses using the same |
| US11140195B2 (en)* | 2018-04-04 | 2021-10-05 | Sophos Limited | Secure endpoint in a heterogenous enterprise network |
| US11616758B2 (en) | 2018-04-04 | 2023-03-28 | Sophos Limited | Network device for securing endpoints in a heterogeneous enterprise network |
| US10972431B2 (en) | 2018-04-04 | 2021-04-06 | Sophos Limited | Device management based on groups of network adapters |
| US10862864B2 (en) | 2018-04-04 | 2020-12-08 | Sophos Limited | Network device with transparent heartbeat processing |
| US11271950B2 (en) | 2018-04-04 | 2022-03-08 | Sophos Limited | Securing endpoints in a heterogenous enterprise network |
| US12147585B2 (en) | 2018-10-09 | 2024-11-19 | Ebay Inc. | Distributed application architectures using blockchain and distributed file systems |
| EP4318410A3 (en)* | 2018-10-09 | 2024-04-17 | eBay Inc. | Distributed application architectures using blockchain and distributed file systems |
| US11075931B1 (en)* | 2018-12-31 | 2021-07-27 | Stealthbits Technologies Llc | Systems and methods for detecting malicious network activity |
| US12192876B2 (en)* | 2019-12-17 | 2025-01-07 | Signify Holding B.V. | Route discovery in networks with combo nodes |
| US20230013924A1 (en)* | 2019-12-17 | 2023-01-19 | Signify Holding B.V. | Route discovery in networks with combo nodes |
| US11736496B2 (en)* | 2020-02-17 | 2023-08-22 | Avanan, Inc. | Responsive actions to suspicious e-mail, as inferred from negative user assessment, by third party security systems without modification of existing e-mail clients |
| US20210258326A1 (en)* | 2020-02-17 | 2021-08-19 | Avanan Inc. | Responsive actions to suspicious e-mail, as inferred from negative user assessment, by third party security systems without modification of existing e-mail clients |
| US12164661B1 (en)* | 2024-01-30 | 2024-12-10 | Grip Security Ltd | Security interface for controlling access to email-data |
| US12219360B1 (en) | 2024-07-24 | 2025-02-04 | Netskope, Inc. | Cellular IoT security using dynamic policy-driven mechanisms for threat mitigation |
| US12255898B1 (en)* | 2024-09-05 | 2025-03-18 | Grip Security Ltd | Management of access to external authorized services |
| Publication number | Publication date |
|---|---|
| US20050193429A1 (en) | 2005-09-01 |
| US20140380456A1 (en) | 2014-12-25 |
| US8832833B2 (en) | 2014-09-09 |
| WO2006080930A1 (en) | 2006-08-03 |
| US10326777B2 (en) | 2019-06-18 |
| Publication | Publication Date | Title |
|---|---|---|
| US10326777B2 (en) | Integrated data traffic monitoring system | |
| US11290424B2 (en) | Methods and systems for efficient network protection | |
| US8631495B2 (en) | Systems and methods for message threat management | |
| US9160755B2 (en) | Trusted communication network | |
| US9185127B2 (en) | Network protection service | |
| US7007302B1 (en) | Efficient management and blocking of malicious code and hacking attempts in a network environment | |
| US8108930B2 (en) | Secure self-organizing and self-provisioning anomalous event detection systems | |
| EP1488316B1 (en) | Systems and methods for enhancing electronic communication security | |
| US20070097976A1 (en) | Suspect traffic redirection | |
| US20030110392A1 (en) | Detecting intrusions | |
| US20070244974A1 (en) | Bounce Management in a Trusted Communication Network | |
| US10135785B2 (en) | Network security system to intercept inline domain name system requests | |
| US20060010209A1 (en) | Server for sending electronics messages | |
| WO2007146690A2 (en) | Systems and methods for graphically displaying messaging traffic | |
| JP2006319982A (en) | Worm-specifying and non-activating method and apparatus in communications network | |
| US20060206615A1 (en) | Systems and methods for dynamic and risk-aware network security | |
| JP2009515426A (en) | High reliability communication network | |
| US20220239676A1 (en) | Cyber-safety threat detection system | |
| US20110185166A1 (en) | Slider Control for Security Grouping and Enforcement | |
| EP1629623A1 (en) | Systems and methods for dynamic and risk-aware network security | |
| Aljahdali et al. | STREAMLINING THREAT RESPONSE AND AUTOMATING CRITICAL USE CASES WITH SECURITY ORCHESTRATION, AUTOMATION AND RESPONSE (SOAR) |
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment | Owner name:THE BARRIER GROUP, MINNESOTA Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DEMOPOULOS, ROBERT JAMES;FLADEBO, DAVID JAMES;REEL/FRAME:027569/0409 Effective date:20040129 | |
| STCF | Information on status: patent grant | Free format text:PATENTED CASE | |
| MAFP | Maintenance fee payment | Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551) Year of fee payment:4 | |
| AS | Assignment | Owner name:CLOUDCOVER USA, INC., MINNESOTA Free format text:MERGER;ASSIGNOR:THE B1 GROUP, INC.;REEL/FRAME:049751/0391 Effective date:20190501 Owner name:THE B1 GROUP, INC., MINNESOTA Free format text:EXCHANGE;ASSIGNOR:THE BARRIER GROUP, LLC;REEL/FRAME:049752/0009 Effective date:20190425 | |
| AS | Assignment | Owner name:CLOUDCOVER USA, INC., MINNESOTA Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THE B1 GROUP, INC.;REEL/FRAME:052978/0873 Effective date:20200618 Owner name:THE B1 GROUP, INC., MINNESOTA Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THE BARRIER GROUP, LLC;REEL/FRAME:052978/0927 Effective date:20200618 | |
| AS | Assignment | Owner name:CLOUDCOVER IP, LLC, MINNESOTA Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CLOUDCOVER USA, INC.;REEL/FRAME:053284/0774 Effective date:20200722 | |
| MAFP | Maintenance fee payment | Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment:8 | |
| AS | Assignment | Owner name:MONTGOMERY CAPITAL PARTNERS V, LP, TEXAS Free format text:SECURITY INTEREST;ASSIGNOR:CLOUDCOVER IP, LLC;REEL/FRAME:061741/0940 Effective date:20221109 | |
| AS | Assignment | Owner name:CLOUDCOVER, LTD., MINNESOTA Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CLOUDCOVER IP, LLC;REEL/FRAME:065968/0843 Effective date:20231206 | |
| AS | Assignment | Owner name:CLOUDCOVER IP, LLC, MINNESOTA Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:MONTGOMERY CAPITAL PARTNERS V, LP.;REEL/FRAME:067126/0731 Effective date:20240415 | |
| AS | Assignment | Owner name:TEGO CYBER INC., NEVADA Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CLOUDCOVER LTD;REEL/FRAME:069665/0653 Effective date:20241220 | |
| AS | Assignment | Owner name:TROUDT, JOHN, WISCONSIN Free format text:SECURITY INTEREST;ASSIGNOR:CLOUDCOVER, LTD;REEL/FRAME:070841/0512 Effective date:20240325 | |
| AS | Assignment | Owner name:CLOUDCOVER, LTD., MINNESOTA Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TEGO CYBER INC.;REEL/FRAME:070997/0648 Effective date:20250501 |